The page you are trying to reach does not exist, or has been moved. Please use the menus or the search box to find what you are looking for.
Search
Recent Posts
- Electron-Based App Security Testing Fundamentals Part 3 (2nd Section) — Extracting and Analyzing .asar Files – Company Blog
- Electron-Based App Security Testing Fundamentals Part 3 (1st Section) — Extracting and Analyzing .asar Files – Company Blog
- Electron-Based App Security Testing Fundamentals Part 2— Installing and Detecting Electron-Based Application – Company Blog
- Electron-Based App Security Testing Fundamentals Part 1 — Introduction to Electron Framework – Company Blog
- From Accessing Restricted Functionality via URL Found in .js File, to Vertical Privilege Escalation through Modification of the ‘accessLevel’ Value in HTTP Responses on the API – Company Blog
- The Unexpected “0” Master ID for Account Data Manipulation
- From Recon via Censys and DNSdumpster, to Getting P1 by Login Using Weak Password – “password”
Categories
- About Me (3)
- Achievements (2)
- Bug Report (30)
- Desktop Apps (8)
- Mobile Apps (5)
- Random Things (8)
- Terms of Use (1)
- Web Apps (21)
- Write-Up (19)
- Write-Up in Bahasa (4)